Roland Turner


Yahi Haze Mapping
about | contact

9V1RS Testing on 2019-09-01 and next steps

Background This post is about part of the ongoing work to get the SARTS VHF repeater 9V1RS near Dover working more reliably and with greater coverage. A particular concern is apparent interference very close to the repeater input frequency 145.025MHz: Note the ~15KHz wide signal centred at ~145.075MHz, and the much stronger ~30KHz wide signal centred at ~145.185MHz. Tests in May graph TB Antenna --- Cavities Cavities -- RX --> Splitter Splitter -- -3dB -->... (more)

Information for Data Subjects - A Side-by-Side Comparison of GDPR Articles 13 and 14

Articles 13 and 14 set out the information that is to be provided when personal data is collected from the data subject or not obtained from the data subject, respectively. The rationale for imperfectly duplicating much of the text from Article 13 into Article 14 is not immediately obvious, and remains unclear even after close examination. Most of the split is obvious: Consequences of non-provision in a statutory/contractual obligation situation are clearly only relevant when... (more)

28756E6B6E6F776E207573657229 == "(unknown user)". 28696E76616C6964207573657229 == "(invalid user)".

For the benefit of those finding these two strings in ssh audit logs. $ decode() { for n in $(echo "$1" | sed -r 's-..-& -g') ; do echo -ne '\x'$n done echo } $ decode 28756E6B6E6F776E207573657229 (unknown user) $ decode 28696E76616C6964207573657229 (invalid user) $ I can readily understand the desire to not present questionable usernames directly in audit log entries in order to prevent various injection attacks in viewing environments, and doing so by... (more)

I appear in 1,203 advertiser contact lists added to Facebook

In case anyone was unclear on the extent to which data brokers are disclosing personal data without any form of accountability to the people in question, do have a look at Facebook's list of advertisers "who use a contact list added to Facebook". The list can be found in Settings > Ads > Advertisers. Needless to say, I've never even heard of many of these people and can only guess that the enormous number of... (more)

Legally Obtaining IEEE 802 Standards Free of Charge

I am perhaps a little late to the party, but I've just noticed that IEEE 802-series standards are generally available free of charge upon request. This does not meet any of the requirements for Creative Commons, Free Software, or Open Source Software, (in particular you can't distribute them) but is at least a step up from having to fork out a lot of money. I am interested in particular in some of the details of... (more)

The Seven Properties of Highly Secure Devices

I've just noticed an interesting piece of work from Microsoft last year which both (a) identifies a minimum useful set of security properties for Internet-connected devices and (b) develops a working prototype with MediaTek to demonstrate how little change to an existing microcontroller is required to make this work. The selected set of properties feels about right: Hardware-based Root of Trust: Does the device have a unique, unforgeable identity that is inseparable from the hardware?... (more)

GDPR for Star Wars Fans

I felt a great disturbance in the Internet, as if millions of non-consensual direct-marketing lists suddenly cried out in terror and were suddenly silenced. I fear something terrible has happened. -- Obi-Spam Kenobi, May 26, 2018. (more)

The Ones Who Walk Away from Facebook

TL;DR: I have started a long-term project to substantially reduce my use of Facebook and increase my engagement with friends elsewhere, rather than outright quitting. I am interested to know where others are with this. They leave Omelas, they walk ahead into the darkness, and they do not come back. The place they go towards is a place even less imaginable to most of us than the city of happiness. I cannot describe it at... (more)

Pan-privi-what now?

From time to time over the last several years, ideas have come to mind for blog posts on privacy, freedom, and security, particularly on the Internet. I have therefore been meaning for a while to start a blog on these topics. Recent events have finally given this project impetus enough to commence. The name Panprivicon is a play on Bentham's panopticon and concisely expresses my desire to live in a world where each of us... (more)